Sorry

In my last CSO Magazine blog, I made the case that BYOD is the New WiFi. I finished that blog by asking readers to: “Please come back and help be a part of the BYOD solution for your customers.”

As described in that blog, security professionals cannot keep saying “no” to BYOD. My firm belief is that security professionals must do more than just mandate policies and enforce decrees. We need to look at reality and meet our customers in their current situation. We need to take off our blinders and understand the facts regarding what staff are actually doing with their personal devices at work.

Over the past year, I’ve struggled with this BYOD reality that exists in workplaces around the world. I’ve read numerous survey results and analyzed the BYOD data. I decided to take a position on this topic and try and advance this topic rather than just repeat what others are saying about BYOD.

What’s my purpose? To offer options to improve security and privacy and help the end user answer their practical questions.

The specific details on the eBook, as well the free introduction, can be found at the “BYOD for You” book website: www.byod4u.com

Why did I write a book on BYOD for end users or the average employee?

There are plenty of technical articles, books and white papers on BYOD for enterprises architects, security geeks, technology experts or others who implement policies for large enterprises. However, this is the first book that I know of that is written specifically for the employees who own the device. I wanted to take a different perspective and offer options for whatever situation the reader is currently in – from a novice employee who quietly brings their own device to work to a smartphone guru who has been bringing their own device for a while.

What topics does the eBook cover?

After explaining some basic terms and concepts involved in bringing your own device to work, I cover the top areas that need to be thought through before an employee brings their own smartphone, tablet or other personal device to work. The topics include: assessing your own environment, work policies, security, privacy, mobile device management (MDM), financial aspects (show me the money), ethical considerations and how to develop your own personal BYOD plan.

How can you possibly provide advice for such a wide divergence in policies and end user work situations?

You can’t possible address every situation or issue. I decided to create three different levels that I call “gold, silver and bronze options” for each particular topic. Recent surveys suggest that the majority of employees who currently bring their own device to work do not have (or are not aware of) their employer’s policy regarding BYOD. These end users have taken matters into their own hands in order to gain efficiency, ease of use or other personal and professional benefits. Typically, these staff feel as if they are on their own regarding security, privacy and other aspects of BYOD. The bronze options offer advice to this group in each critical area.

On the other extreme, the gold options are available to employees who work for companies with strong BYOD policies, full mobile device management technology (MDM) in place, financial incentives to bring their own device to work and good training available to BYOD adopters.

Any final thoughts on the book?

We will need improvements in MDM technology, new mobile device hypervisors and more. But most of all, technology and security pros need to embrace BYOD today and become part of the solution to existing BYOD problems at home and work. Answers must include people, process and technology changes. Security pros need to engage our customers on the future workplace environment.

I’d love to hear your thoughts on BYOD. Should security professionals embrace BYOD or fight it? You can engage this BYOD topic in social media in the following ways: